Sciweavers

1028 search results - page 15 / 103
» Using Attack Graphs to Design Systems
Sort
View
124 views 110 votes 15 years 4 months ago  GECCO 2006»
In this work, we employed genetic programming to evolve a "white hat" attacker; that is to say, we evolve variants of an attack with the objective of providing better de...
123 views 105 votes 15 years 7 months ago  HICSS 2007»
In a world where intelligence can be arguably measured by an animal’s ability to use tools, are we marking ourselves for natural selection? Software development tools are steadi...
139 views 113 votes 15 years 5 months ago  STOC 1998»
In [6], Gallager introduces a family of codes based on sparse bipartite graphs, which he calls low-density parity-check codes. He suggests a natural decoding algorithm for these c...
94 views 87 votes 15 years 6 months ago  ATAL 2003»
Distributed Internet-based attacks on computer systems are becoming more prevalent. These attacks usually employ some form of automation and involve the compromise of many systems...
117 views 104 votes 15 years 6 months ago  ITCC 2005»
This paper presents a high performance and scalable elliptic curve processor which is designed to be resistant against timing attacks. The point multiplication algorithm (double-a...
206 views 91 votes 15 years 4 months ago  CCS 2010»
In this paper, we propose a new form of image-based CAPTCHA we term "scene tagging". It tests the ability to recognize a relationship between multiple objects in an imag...
208 views 130 votes 15 years 1 months ago  CCS 2010»
The ability to locate random relays is a key challenge for peer-to-peer (P2P) anonymous communication systems. Earlier attempts like Salsa and AP3 used distributed hash table look...
115 views 109 votes 15 years 7 months ago  ITNG 2008»
We propose the characteristics of a software tool that leverages specifying attack pattern details in understandable hierarchies. These hierarchies are currently manually populate...
134 views 102 votes 15 years 5 months ago  EUC 2007»
Traditional cryptographic primitives are not supported on low-cost RFID tags since, at most, 4K gates can be devoted to securityrelated tasks. Despite this, there are a vast number...
138 views 80 votes 15 years 7 months ago  BROADNETS 2007»
—Attacks launched over the Internet have become a pressing problem. Attackers make use of a variety of techniques to anonymize their traffic, in order to escape detection and pr...